MULTI-DIMENSIONAL CUSTOMIZATION MODELLING BASED ON METAGRAPH FOR SAAS MULTI-TENANT APPLICATIONS

Size: px
Start display at page:

Download "MULTI-DIMENSIONAL CUSTOMIZATION MODELLING BASED ON METAGRAPH FOR SAAS MULTI-TENANT APPLICATIONS"

Transcription

1 MULTI-DIMENSIONAL CUSTOMIZATION MODELLING BASED ON METAGRAPH FOR SAAS MULTI-TENANT APPLICATIONS Ashraf A. Shahin 1, 2 1 College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh, Kingdom of Saudi Arabia ashraf_shahen@ccis.imamu.edu.sa 2 Department of Computer and Information Sciences, Institute of Statistical Studies & Research, Cairo University, Egypt ABSTRACT Software as a Service (SaaS) is a new software delivery model in which pre-built applications are delivered to customers as a service. SaaS providers aim to attract a large number of tenants (users) with minimal system modifications to meet economics of scale. To achieve this aim, SaaS applications have to be customizable to meet requirements of each tenant. However, due to the rapid growing of the SaaS, SaaS applications could have thousands of tenants with a huge number of ways to customize applications. Modularizing such customizations still is a highly complex task. Additionally, due to the big variation of requirements for tenants, no single customization model is appropriate for all tenants. In this paper, we propose a multi-dimensional customization model based on metagraph. The proposed mode addresses the modelling variability among tenants, describes customizations and their relationships, and guarantees the correctness of SaaS customizations made by tenants. KEYWORDS Cloud Computing, Software as a Service (SaaS), Multi-tenancy, Customization Modelling, Metagraph 1. INTRODUCTION Software as a Service (SaaS) is a cloud computing service model in which pre-built applications are delivered to customers as a service [1]. The main goal of the SaaS providers is attracting a significant number of tenants for their SaaS applications. However, the functionality and quality that individual customers require from a software application can differ [2]. This forces the SaaS providers to deploy multiple software applications customized for each set of users, which results in increasing cost of infrastructure and making it difficult to maintain and update. To overcome with this problem, the SaaS providers deploy software applications allow tenantspecific configuration and customization. For customization, some elements of an application need to be customized, including graphic user interfaces (GUI), workflow, service, and data models [3]. Several researches have attempted to support configuration and customization of these elements [1, 4, 5, 6, 7]. One of the most prominent approaches for achieving the tenant-specific configuration and customization is providing an application template with unspecified parts that can be customized by each tenant [7, 8]. These unspecified parts are called customization points of an application [3]. For each customization point, a set of components are provided to achieve variations in tenants requirements. A tenant customizes each customization point by selecting components from the corresponding set or by defining new components.

2 However, modularizing such customizations still is a highly complex task. The complexity, in general, comes from the following sources. First, the SaaS applications could have hundreds of customization points with thousands of components for achieving variations in tenants requirements. Second, the relationships and dependences of components are more complex. It is possible for some components to require other components or for some components to conflict with others (figure 1 shows the relationships of components from different customization points). Third, due to the big variation of requirements for the tenants, no single customizations model is appropriate for all tenants. To address this variation, the developers need to provide software applications with different modularizations. Figure 1. Relationships of components from different customization points Multi-dimensional separation of concerns (MDSOC) is separation of concerns that allows developers to partition overlapping or interacting concerns in new and existing software products along multiple dimensions of decomposition and composition. MDSOC allows developers to identify new concerns, and new dimensions of concern, incrementally and simultaneously, at any time [9]. Another important property for MDSOC is on-demand remodularization, which is the ability to change the way in which a system is modularized without having to refactoring, reengineering, or other invasive change [10, 11]. A detailed description of MDSOC approach is available in [9]. In this paper, we apply MDSOC concepts to address the modelling variability among tenants. Applying MDSOC allows developers to provide independent dimension for each type of concerns and allows tenants to customize concerns that crosscut several customization points independently. For example, tenants that are concerned with security can customize the security concerns in security dimension only. This results in distinct customization models, which are easier to handle than one large model. On the other hand, we use metagraph to describe dependences between components of each concern. Metagraph is a graphical structure in which edges represent directed relationships between sets of elements [12]. Using metagraph tools, we can combine the separated models to validate the customization points values made by tenants. This paper is organized as the following. Section 2 discusses the related work in customization modelling. Section 3 describes our multi-dimensional customization model. Section 4 evaluates the proposed model. Section 5 concludes this paper. 2. RELATED WORK Several researchers have tried to modularize customizations in SaaS applications [13, 14, 15]. In [13], the authors propose a method for modelling customization process based on Temporal

3 Logic of Actions, and propose a verification algorithm to check tenant s customization and to guarantee that each step in customization will not cause unpredictable influence on system and follow the related rules defined by SaaS provider. In [3], the authors propose a customization model based on metagraph to describe relationships between customization points and propose an algorithm to calculate related sets when one customization point is changed. In [14], the authors propose a multi-granularity customization relationship model that uses directed graph to describe relations in the customization process. The authors introduce a verification algorithm to guarantee the correctness of SaaS customization products that are obtained by the proposed model. In [15], the authors model the customization process using orthogonal variability model and propose a guided semi-automated customization based on mining existing tenants customization. In [16], the authors propose an approach for model-level customization management, which raises the customization management to the level of business services. They specify variation points using so-called specialization patterns, which have been originally developed to support task-driven specialization of application frameworks. In [17], the authors propose multi-level customization model for SaaS applications. To reduce duplication of customization, the proposed model supports customization sharing among different virtualized applications in a tenant area. The proposed model reduces repeated customization operations by allowing lowerlevel applications to inherit high-level applications customizations. However, most of current research work has not addressed the modelling variability among tenants. 3. MULTI-DIMENSIONAL CUSTOMIZATION MODELLING BASED ON METAGRAPH In this section, we begin by giving an overview of the basic features of metagraphs from [12]. This is followed by a description of the proposed model. Finally, we will propose two algorithms to validate customizations made by tenants Metagraphs Metagraphs are graphical structures in which edges represent directed relationships between sets of elements. They extend both directed graphs (by allowing multiple elements in vertices) and hypergraphs (by including directionality in edges). Definition 1 (metagraph): Given a finite generating set X = {xi, i = 1... I}, a metagraph is an ordered pair S = X, E, in which E is set of edges E = { e k, k = 1...K}. Each edge is an ordered pair e k = V k, W k, in which V k X is the invertex of the edge e k and W k X is the outvertex. The coinput of any x V k is V k \{X} and the cooutput of any x W k is W k \ { X }. Also V k U W k Φ for all k. For example, the metagraph in Figure 2 can be represented as follows: S= X,E, where X=x,x,x,x,x,x is the generating set and E=e,e,e is the set of edges where each edge can be specified as pair ( for example =,,, ) Invertex,,, =,, Outvertex,,, =,, Coinput,,,, =, Cooutput,,,, =,

4 Figure 2. Metagraph example Definition 2 (simple path): Given a metagraph S = X, E, a simple path from a source to a target is a sequence of edges h, =, =1,, such that,! ", and! # #% ', )=1,, 1. The coinput of x is =1 \ =1! \ and the cooutput of x' is " -! \. The length of a simple path is the number of edges in the path; thus, the length of h, =, =1,, is L. For example, in the metagraph of Figure 2, e,e is a simple path from x to x with length 2. The coinput of x is,, and the cooutput of x is,. Definition 3 (metapath): Given a metagraph S= X,E, a metapath MB,C from a source B X to a target C X is a set of edges E E such that (1) e E is on a simple path from some element in B to some element in, (2) V 5 6\ 5 6 W B, and (3) C 56 W 5 6. For example, in Figure 2, one metapath from to is 9,, =,,. Definition 4 (adjacency matrix): the adjacency matrix A of a metagraph is a square matrix with one row and one column for each element in the generating set X. The ijth element of A, denoted a ;<, is a set of triples, one for each edge e connecting x ; to x <. Each triple is of the form =>?,=@?, in which =>? is the coinput of x ; in e and =@? is the cooutput of x < in e. For example, the adjacency matrix for the metagraph in Figure 2 is shown in Figure 3. Figure 3. The adjacency matrix of the metagraph in figure 2 Definition 5 (closure matrix): the closure of adjacency matrix A, denoted A, represents all simple paths of any length in the metagraph. The ijth element of A, denoted a ;<, is a set of triples, one for each simple path hcx ;,x < D of any length connecting x ; to x <. The closure matrix of Figure 3 appears in Figure 4. Definition 6: Given a generating set X and two metagraphs S = X,E and S = X,E with adjacency matrices A and A respectively, then the sum of the two adjacency matrices is the adjacency matrix of the metagraph S = X,E E with componentsh +H #J =K #J K #J.

5 Figure 4. The closure of the adjacency matrix in Figure 3 Definition 7: A metagraph S = X,E is said to be a sub-metagraph (SMG) of another metagraph S = X,E if X X and E E. A metagraph S is an input independent SMG of a metagraph S if every element of S that is not a pure input is determined only by edges within S. A metagraph S is an output independent SMG of a metagraph S if every element of S that is not a pure output is used only by edges within S. A metagraph S is an independent SMG of a metagraph S if it is both input independent and output independent The proposed model Consider =L=MN #,)=1,,> is the set of all customization points in SaaS application. For each customization point MN O =L, there is a set of components = P = Q,R=1,..,S provided by the SaaS application developer. Tenant customizes customization point MN P by selecting a subset of components T= P = P. Definition 8 (concern): Each concern that is important for tenants is represented by a metagraph =U # = VPW,X VPW, where VPW is a set of all components that address this concern from all customization points component sets (as shown in figure 5), and X VPW is the relationships of these components. Figure 5. Concerns crosscut several customization points In this paper, we concerned with required by relationship. Sometimes component requires more than one component. To express this state we add and vertex to the metagraph. For

6 example, figure 6 shows that components x and x are required by component x and components x and x are required by component x. Figure 6. Metagraph example Concerns are considered to overlap if their component sets are not disjoint. If there is a component address more than one concern, the required components can be different depending on the role played by this component in each concern. Tenant customizes concern by selecting some components from its component set. The customized concern can be represented as a sub-metagraph T=U # =U #. To guide tenants during customization process, closure matrix of each concern is generated to return all possible customization paths of this concern. Tenants review these paths and make their decisions. Definition 9 (dimension of concerns): Dimension of concerns is a type of concerns that is important for tenants (e.g., performance, security) such that each dimension of concerns Y Z =M[ #,)=1,..,> contains a set of concerns whose component sets are disjoint and each concern is an independent sub-metagraph. Dimension can be represented as a Metagraph Y Z =,X Z, where is the set of all components in SaaS application, and X Z =X VP\ X VP] X VP^, X VP_ is a set of edges for one of the concerns belong to this dimension. The adjacency matrix of each dimension is the sum of all adjacency matrixes of its concerns. Each dimension, has one concern called the None concern. All components in SaaS application that do not address any concern in this dimension address the None concern. This means that each component in the SaaS application will be located at exactly one concern in each dimension. Definition 10 (SaaS application): A SaaS application is a set of dimensions Y =`a J,b=1,..,cd, such that every concern is in exactly one dimension in Y. A SaaS application can be represented as a metagraph e=,x, is the set of all components in SaaS application, and X = X X X P, X f is the set of edges for one of the dimensions in this application. Definition 11 (customization operations): is what a tenant does to customize the SaaS application to meet his requirements. In this paper, we define two types of customization operations: add component, and delete component. Tenant customizes SaaS application by a sequence of these operations such that each operation moves SaaS application from a valid state to another valid state. Definition 12 (customization model): customization for each tenant are represented as a set TY =`ga J,b=1,..,cd, where ga J is the set of customized concerns in dimension a J. each tenant s customization is a sub-metagraph from SaaS application metagraph. Tenants customize SaaS application by selecting dimensions that are important for them (e.g., performance, security), and select concerns from each dimension (e.g., authentication, authorization, and encryption in security dimension). Finally, tenants can customize each concern by specifying components from its component set.

7 3.3. Customization validation Tenant customizes the SaaS application using a sequence of customization operations. To validate this sequence, we validate each operation based on the customizations that are constructed by the previous operations. If tenant requests to add new component to a specific concern in his customization, algorithm 1 shows how to validate and perform this operation. Algorithm 1 adds new components only if their requirements already exist in the tenant s customization. Algorithm 2 deletes components from the tenant s customization only if these components are not required by any component in the tenant s customization. Algorithm 2 deletes all edges that contain the deleted component in its outvertex without any cooutput. To minimize run-time and memory usage for the proposed algorithms, the only required rows or columns of adjacency matrixes are constructed. Algorithm 1 Add component 1: FUNCTION add 2: IN: =U= VP,X VP, the concern metagraph from the SaaS application 3: IN: TY = hz,x hz, the tenant s customization metagraph. 4: IN: =U hz = VPij,X VPij, the customization of concern =U from TY 5: IN: #, the component added to customization. 6: OUT: v, valid or invalid 7: BEGIN 8: Construct adjacency matrix column # of =U as H VPW. 9: for each K kl,k W in H VPW 10: if K kl,k W m 11: for each triple =>,=@, in K kl,k W 12: if and => 13: if ` J d => hz 14: VPij = VPij # C` J d =>D 15: X VPij =X VPij 16: return valid 17: else if C` J d =>D hz m 18: VPij = VPij # oc` J d =>D hz p 19: X VPij =X VPij 20: return valid 21: for each K kl,k W in H VPW 22: if K kl,k W m 23: return invalid 24: VPij = VPij # 25: return valid Algorithm 2 Delete component 1: FUNCTION delete 2: IN: TY = hz,x hz, the tenant s customization metagraph. 3: IN: Z, the component deleted from customization. 4: OUT: v, valid or invalid 5: BEGIN 6: Construct adjacency matrix row Z of TY as q hzj. 7: for each K kj,k W in q hzj 8: if K kj,k W m 9: return invalid 10: Construct adjacency matrix column Z of TY as = hzj. 11: for each K kl,k j in column Z in = hzj 12: if K kl,k j m

8 13: for each triple in K kl,k j 14: if =@=m 15: for each concern =U hz = VPij,X VPij in TY 16: X VPij =X VPij 17: X hz =X hz 18: for each concern =U hz = VPij,X VPij in TY 19: VPij = VPij Z 20: return valid 4. EVALUATION There are a number of benefits for the proposed model. Some of these benefits have been explored below: - Customization complexity: by applying MDSOC, the proposed model allows tenant to customize one concern at a time instead of customization point. Concerns cut across multiple customization point to collect components that are related to a specific area of interest. In other words, tenant customizes customization points incrementally. Which enables tenant easily customizes the customization points and easily understands their dependencies. On the other side, provider follows the same steps in developing. Instead of developing all components of a specific customization point, provider develops components of a specific concern. - SaaS upgradeability: in some SaaS application, tenants may be encountering some issues when SaaS providers upgrade their applications. The proposed model allows providers to add new concerns and new dimensions at any time without having to reengineering existing ones. Providers can upgrade each concern independently because each concern is modeled as independent sub-metagraph and is unaffected by changes that may occur within its associated dimension. Using metagraph tools, providers can expect the effects of their upgrades on the tenants customizations within each concern. - Duplication of customization: the SaaS providers need to reduce duplication of customization to exploit the economies of scale [2]. Most of duplications of customization come from allowing tenants to define new components. This makes the SaaS providers face a broad spectrum of tenants' customizations and makes it difficult to drive commonalities amongst the customizations across tenants. By allowing providers to model a large number of components and enabling tenants to handle these components easily, providers can provide a wide range of components to reduce duplication of customization. - Customization correctness: the proposed algorithms and metagraph tools had been used to ensure the correctness of customizations made by tenants. However, with the proposed model, providers can face some difficulties in specifying disjoint concerns and their components in each dimension. We believe that, graph decomposition tools can help providers in specifying these concerns. To evaluate the run-time performance of the proposed model and algorithms for differing application sizes, we had generated customization models with different sizes and random dependences. Figures 7 shows the average response time for each model size.

9 Figure 7. Response time for different application sizes To evaluate the run-time performance of the proposed model and algorithms for varying numbers of users, we had generated model with size 500 components and had performed add and delete operations on the generated model with a large number of concurrent requests from users. The results are described in Figure 8. Figure 8. Response time for different numbers of concurrent requests 5. CONCLUSION In this paper, we presented a multi-dimensional customization model. The proposed model applied the MDSOC concepts to address the modelling variability among tenants and described components dependences using metagraph. The main benefits of our model are: (i) simplifying customization process by allowing tenants to incrementally customize customization points; (ii) increasing SaaS upgradeability by allowing providers to add new concerns and new dimensions at any time without having to reengineering existing ones; and (iii) reducing duplication of customization by minimizing the needs for define new components. Additionally, we proposed algorithms that can judge whether tenant s customization action has satisfied all the dependency, and prevent the invalid action. However, specifying disjoint concerns and their components in each dimension (which is beyond the scope of this paper) still is a challenge for the proposed model. We can use graphdecomposition tools to specify these concerns. Finally, we can conclude that, applying MDSOC concepts to customization models addresses the modelling variability among tenants. Our future work will be to improve the proposed model to guide tenants during the customization process based on mining existing tenants customizations.

10 REFERENCE [1] W. Lee and M. Choi, A multi-tenant web application framework for SaaS, 2012 IEEE Fifth International Conference on Cloud Computing, vol. 0, pp , [2] R. Mietzner, A. Metzger, F. Leymann, and K. Pohl, Variability modeling to support customization and deployment of multi-tenant-aware software as a service applications, in ICSE Workshop on Principles of Engineering Service Oriented Systems, PESOS 2009, 2009, pp [3] C. Lizhen, W. Haiyang, J. Lin, and H. Pu, Customization modeling based on metagraph for multi-tenant applications, in th International Conference on Pervasive Computing and Applications (ICPCA), 2010, pp [4] P. Aghera, S. Chaudhary, and V. Kumar, An approach to build multi-tenant SaaS application with monitoring and SLA, in 2012 International Conference on Communication Systems and Network Technologies (CSNT), 2012, pp [5] M. Pathirage, S. Perera, I. Kumara, and S. Weerawarana, A multi-tenant architecture for business process executions, in 2011 IEEE International Conference on Web Services (ICWS), 2011, pp [6] J. Lee, S. Kang, and S. J. Hur, Web-based development framework for customizing java-based business logic of SaaS application, in 14th International Conference on Advanced Communication Technology (ICACT), 2012, pp [7] H. Moens, E. Truyen, S. Walraven, W. Joosen, B. Dhoedt, and F. De Turck, Developing and managing customizable software as a service using feature model conversion, in Network Operations and Management Symposium (NOMS), 2012 IEEE, 2012, pp [8] W. Sun, X. Zhang, C. J. Guo, P. Sun, and H. Su, Software as a service: Configuration and customization perspectives, in Congress on Services Part II, SERVICES-2. IEEE, 2008, pp [9] B. Pekilis, Multi-dimensional separation of concerns and IBM Hyper/j, University of Waterloo, Canada, Tech. Rep., January [10] P. Tarr, H. Ossher, W. Harrison, and S. Sutton, N degrees of separation: multi-dimensional separation of concerns, in Proceedings of the 1999 International Conference on Software Engineering, 1999, pp [11] H. Ossher and P. Tarr, Multi-dimensional separation of concerns and the hyperspace approach, in Software Architectures and Component Technology, ser. The Springer International Series in Engineering and Computer Science, Ed. Springer US, 2002, vol. 648, pp [12] A. Basu and R. W. Blanning, Metagraphs and Their Applications. Springer US, 2007, vol. 15, pp [13] S. Luan, Y. Shi, and H. Wang, A mechanism of modeling and verification for SaaS customization based on TLA, in Web Information Systems and Mining, ser. Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2009, vol. 5854, pp [14] H. Li, Y. Shi, and Q. Li, A multi-granularity customization relationship model for SaaS, in International Conference on Web Information Systems and Mining, WISM 2009, 2009, pp [15] W.-T. Tsai and X. Sun, SaaS multi-tenant application customization, in 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), 2013, pp [16] H. Hadaytullah, K. Koskimies, and T. Systa, Using model customization for variability management in service compositions, in IEEE International Conference on Web Services, ICWS 2009, 2009, pp [17] L. Kong, Q. Li, and X. Zheng, A novel model supporting customization sharing in SaaS applications, in 2010 International Conference on Multimedia Information Networking and Security (MINES), 2010, pp

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS Ashraf A. Shahin 1, 2 1 College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh, Kingdom of Saudi

More information

Multi-Tenant Engineering Architecture in SaaS

Multi-Tenant Engineering Architecture in SaaS Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing

More information

Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications

Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications Pieter-Jan Maenhaut, Hendrik Moens, Veerle Ongenae and Filip De Turck Ghent University, Faculty of

More information

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu ABSTRACT This

More information

Building a Customizable Business-Process-as-a-Service Application with current State-of-Practice

Building a Customizable Business-Process-as-a-Service Application with current State-of-Practice Building a Customizable Business-Process-as-a-Service Application with current State-of-Practice Fatih Gey, Stefan Walraven, Dimitri Van Landuyt and Wouter Joosen iminds-distrinet, KU Leuven, Celestijnenlaan

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

Multi-layer Structure of Data Center Based on Steiner Triple System

Multi-layer Structure of Data Center Based on Steiner Triple System Journal of Computational Information Systems 9: 11 (2013) 4371 4378 Available at http://www.jofcis.com Multi-layer Structure of Data Center Based on Steiner Triple System Jianfei ZHANG 1, Zhiyi FANG 1,

More information

MDE Opportunities in Multi-Tenant Cloud Applications

MDE Opportunities in Multi-Tenant Cloud Applications MDE Opportunities in Multi-Tenant Cloud Applications Mohammad Abu Matar 1 and Jon Whittle 2 1 Etisalat British Telecom Innovation Center Khalifa University of Science, Technology and Research Abu Dhabi,

More information

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software

More information

A Platform for Changing Legacy Application to Multi-tenant Model

A Platform for Changing Legacy Application to Multi-tenant Model , pp.407-418 http://dx.doi.org/10.14257/ijmue.2014.9.8.38 A Platform for Changing Legacy Application to Multi-tenant Model Yangpeng Zhu School of Economic and Management, Xi an Shiyou University, Xi an

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Software Testing Strategies and Techniques

Software Testing Strategies and Techniques Software Testing Strategies and Techniques Sheetal Thakare 1, Savita Chavan 2, Prof. P. M. Chawan 3 1,2 MTech, Computer Engineering VJTI, Mumbai 3 Associate Professor, Computer Technology Department, VJTI,

More information

Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy

Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Dept. of Computer Science Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Matteo Camilli matteo.camilli@unimi.it http://camilli.di.unimi.it ICSE 2014 Hyderabad, India June 3,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

Using Library Dependencies for Clustering

Using Library Dependencies for Clustering Using Library Dependencies for Clustering Jochen Quante Software Engineering Group, FB03 Informatik, Universität Bremen quante@informatik.uni-bremen.de Abstract: Software clustering is an established approach

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

E-COMMERCE APPLICATION BASED ON THE MVC ARCHITECTURE ON MULTI-CLOUD SYSTEM

E-COMMERCE APPLICATION BASED ON THE MVC ARCHITECTURE ON MULTI-CLOUD SYSTEM E-COMMERCE APPLICATION BASED ON THE MVC ARCHITECTURE ON MULTI-CLOUD SYSTEM Rainik Soni 1, Ankit Parmar 2, Rohit Sawant 3, Ms. Shweta Sharma 4 1,2,3 B.E.CMPN (Pursuing), 4 Project Guide, Department of Computer

More information

ISSN: 0974-2115 Journal of Chemical and Pharmaceutical Sciences Multiple-client data management using robust database pattern design S. A.

ISSN: 0974-2115 Journal of Chemical and Pharmaceutical Sciences Multiple-client data management using robust database pattern design S. A. ISSN: 0974-2115 Multiple-client data management using robust database pattern design S. A. Ramesh Kumar 1, C.Ashwini 2, E. Rajeshwaran 3 1. Asst.Prof, Karpaga Vinayaga College of Engineering &Technology.

More information

Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing

Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing Nilesh Pachorkar 1, Rajesh Ingle 2 Abstract One of the challenging problems in cloud computing is the efficient placement of virtual

More information

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Dinesha H A Crucible of Research and Innovation PES Institute of Technology BSK 3 rd Stage Bangalore-85 R Monica M.Tech

More information

Protocols for Efficient Inference Communication

Protocols for Efficient Inference Communication Protocols for Efficient Inference Communication Carl Andersen and Prithwish Basu Raytheon BBN Technologies Cambridge, MA canderse@bbncom pbasu@bbncom Basak Guler and Aylin Yener and Ebrahim Molavianjazi

More information

Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns.

Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns. Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Functional and Non-Functional

More information

Fault-Tolerant Application Placement in Heterogeneous Cloud Environments. Bart Spinnewyn, prof. Steven Latré

Fault-Tolerant Application Placement in Heterogeneous Cloud Environments. Bart Spinnewyn, prof. Steven Latré Fault-Tolerant Application Placement in Heterogeneous Cloud Environments Bart Spinnewyn, prof. Steven Latré Cloud Application Placement Problem (CAPP) Application Placement admission control: decide on

More information

Authentication Mechanism for Private Cloud of Enterprise. Abstract

Authentication Mechanism for Private Cloud of Enterprise. Abstract Authentication Mechanism for Private Cloud of Enterprise Mei-Yu Wu *, and Shih-Pin Lo Department of Information Management, Chung Hua University, Hsinchu, Taiwan {mywu, e10010008}@chu.edu.tw Abstract Enterprises

More information

Configuration as a Service in Multi-Tenant Enterprise Resource Planning System

Configuration as a Service in Multi-Tenant Enterprise Resource Planning System Configuration as a Service in Multi-Tenant Enterprise Resource Planning System Mona Misfer Al-Shardan and Djamal Ziani Abstract Enterprise resource planning (ERP) systems are the organizations tickets

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University

More information

SERG. Multi-Tenant SaaS Applications: Maintenance Dream or Nightmare?

SERG. Multi-Tenant SaaS Applications: Maintenance Dream or Nightmare? Delft University of Technology Software Engineering Research Group Technical Report Series Multi-Tenant SaaS Applications: Maintenance Dream or Nightmare? Cor-Paul Bezemer, Andy Zaidman Report TUD-SERG-2010-031

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information

Graphical Web based Tool for Generating Query from Star Schema

Graphical Web based Tool for Generating Query from Star Schema Graphical Web based Tool for Generating Query from Star Schema Mohammed Anbar a, Ku Ruhana Ku-Mahamud b a College of Arts and Sciences Universiti Utara Malaysia, 0600 Sintok, Kedah, Malaysia Tel: 604-2449604

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Part 2: Community Detection

Part 2: Community Detection Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -

More information

MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012

MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Course Overview This course provides students with the knowledge and skills to design business intelligence solutions

More information

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS

DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS Paparao Golusu 1, Nagul Shaik 2 1 M. Tech Scholar (CSE), Nalanda Institute of Tech, (NIT), Siddharth Nagar, Guntur, A.P, (India) 2 Assistant

More information

AUTOMATED SYSTEM FOR NURSE SHEDULING USING GRAPH COLORING

AUTOMATED SYSTEM FOR NURSE SHEDULING USING GRAPH COLORING AUTOMATED SYSTEM FOR URSE SHEDULIG USIG GRAPH COLORIG MR. B.T.G.S.KUMARA Department of Computing and Information Systems, Faculty of Applied Sciences, Sabaragamuwa University of Sri Lanka. kumara@sab.ac.lk

More information

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

A Study on Service Oriented Network Virtualization convergence of Cloud Computing A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD)

Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD) Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD) M.Rajesh, Research Scholar, Department of Computer Science & Engg., St.Peter's University Chennai, rajesmano@gmail.com

More information

An Approach Towards Customized Multi- Tenancy

An Approach Towards Customized Multi- Tenancy I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy

More information

Separating Concerns in Software Logistics

Separating Concerns in Software Logistics Separating Concerns in Software Logistics Danny Greefhorst Software Engineering Research Centre PO Box 424, 3500 AK The Netherlands greefhor@serc.nl Software logistics deals with the storage, administration,

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

Saving Mobile Battery Over Cloud Using Image Processing

Saving Mobile Battery Over Cloud Using Image Processing Saving Mobile Battery Over Cloud Using Image Processing Khandekar Dipendra J. Student PDEA S College of Engineering,Manjari (BK) Pune Maharasthra Phadatare Dnyanesh J. Student PDEA S College of Engineering,Manjari

More information

Multi-Tenant Architecture Comparison

Multi-Tenant Architecture Comparison Multi-Tenant Architecture Comparison Jaap Kabbedijk, Michiel Pors, Slinger Jansen, and Sjaak Brinkkemper Department of Information and Computing Sciences Utrecht University, Netherlands {J.Kabbedijk, M.Pors,

More information

A Multi-tenant Architecture for Business Process Executions

A Multi-tenant Architecture for Business Process Executions A Multi-tenant Architecture for Business Process Executions Milinda Pathirage, Srinath Perera, Indika Kumara, Sanjiva Weerawarana WSO2 Inc. Mountain View, CA, USA {milinda, srinath, indika, sanjiva }@wso2.com

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

A Tool for Generating Partition Schedules of Multiprocessor Systems

A Tool for Generating Partition Schedules of Multiprocessor Systems A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.

More information

DATA ANALYSIS II. Matrix Algorithms

DATA ANALYSIS II. Matrix Algorithms DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where

More information

A Model-driven Approach to Flexible Multi-Level Customization of SaaS Applications

A Model-driven Approach to Flexible Multi-Level Customization of SaaS Applications A Model-driven Approach to Flexible Multi-Level Customization of SaaS Applications Zakwan Jaroucheh, Xiaodong Liu, Sally Smith School of Computing Edinburgh Napier University, UK {z.jaroucheh, x.liu, s.smith}@napier.ac.uk

More information

Model-Driven Cloud Data Storage

Model-Driven Cloud Data Storage Model-Driven Cloud Data Storage Juan Castrejón 1, Genoveva Vargas-Solar 1, Christine Collet 1, and Rafael Lozano 2 1 Université de Grenoble, LIG-LAFMIA, 681 rue de la Passerelle, Saint Martin d Hères,

More information

Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method

Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method Secure File Sharing in the Cloud by Row Complete Matrix Re-encryption Method Tzeng, Jengnan National Chengchi University, Taipei, Taiwan Tsai, Jer-Min Kun Shan University, Yung-Kang, Taiwan Chen, I-Te

More information

OPTIMIZED AND INTEGRATED TECHNIQUE FOR NETWORK LOAD BALANCING WITH NOSQL SYSTEMS

OPTIMIZED AND INTEGRATED TECHNIQUE FOR NETWORK LOAD BALANCING WITH NOSQL SYSTEMS OPTIMIZED AND INTEGRATED TECHNIQUE FOR NETWORK LOAD BALANCING WITH NOSQL SYSTEMS Dileep Kumar M B 1, Suneetha K R 2 1 PG Scholar, 2 Associate Professor, Dept of CSE, Bangalore Institute of Technology,

More information

A SaaS-based Software Modeling for Bank Intermediary Business

A SaaS-based Software Modeling for Bank Intermediary Business Computer Science and Information Technology 3(2): 31-36, 2015 DOI: 10.13189/csit.2015.030201 http://www.hrpub.org A SaaS-based Software Modeling for Bank Intermediary Business Bo Li 1,2,*, Wei-Tek Tsai

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

Simultaneous Gamma Correction and Registration in the Frequency Domain

Simultaneous Gamma Correction and Registration in the Frequency Domain Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University

More information

Efficient Multi Vendor services for Field Based Service

Efficient Multi Vendor services for Field Based Service RESEARCH ARTICLE Efficient Multi Vendor services for Field Based Service Madhushree M.Kubsad 1,Prof. Manu T.M 2 1(Dept: Computer Engineer MTech, KLEIT Hubballi Karnataka, India) OPEN ACCESS Abstract: Field

More information

CMotion: A Framework for Migration of Applications into and between Clouds

CMotion: A Framework for Migration of Applications into and between Clouds Institute of Architecture of Application Systems CMotion: A Framework for Migration of Applications into and between Clouds Tobias Binz, Frank Leymann, David Schumm Institute of Architecture of Application

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Data Mining Governance for Service Oriented Architecture

Data Mining Governance for Service Oriented Architecture Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY alibek@tr.ibm.com Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

A Novel Adaptive Virtual Machine Deployment Algorithm for Cloud Computing

A Novel Adaptive Virtual Machine Deployment Algorithm for Cloud Computing A Novel Adaptive Virtual Machine Deployment Algorithm for Cloud Computing Hongjae Kim 1, Munyoung Kang 1, Sanggil Kang 2, Sangyoon Oh 1 Department of Computer Engineering, Ajou University, Suwon, South

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

A JAVA TCP SERVER LOAD BALANCER: ANALYSIS AND COMPARISON OF ITS LOAD BALANCING ALGORITHMS

A JAVA TCP SERVER LOAD BALANCER: ANALYSIS AND COMPARISON OF ITS LOAD BALANCING ALGORITHMS SENRA Academic Publishers, Burnaby, British Columbia Vol. 3, No. 1, pp. 691-700, 2009 ISSN: 1715-9997 A JAVA TCP SERVER LOAD BALANCER: ANALYSIS AND COMPARISON OF ITS LOAD BALANCING ALGORITHMS 1 *Majdi

More information

Dimensionality Reduction: Principal Components Analysis

Dimensionality Reduction: Principal Components Analysis Dimensionality Reduction: Principal Components Analysis In data mining one often encounters situations where there are a large number of variables in the database. In such situations it is very likely

More information

Warshall s Algorithm: Transitive Closure

Warshall s Algorithm: Transitive Closure CS 0 Theory of Algorithms / CS 68 Algorithms in Bioinformaticsi Dynamic Programming Part II. Warshall s Algorithm: Transitive Closure Computes the transitive closure of a relation (Alternatively: all paths

More information

Imam Mohammad Ibn Saud Islamic University College of Computer and Information Sciences Department of Computer Sciences

Imam Mohammad Ibn Saud Islamic University College of Computer and Information Sciences Department of Computer Sciences 1121-1122 In the Name Of Allah, the Most Beneficent, the Most Merciful Imam Mohammad Ibn Saud Islamic University Department of Computer Sciences Program Description of Master of Science in Computer Sciences

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

Design of Expanded Assessment Management System for Open-Source Moodle LMS Module

Design of Expanded Assessment Management System for Open-Source Moodle LMS Module 2012 3rd International Conference on e-education, e-business, e-management and e-learning IPEDR vol.27 (2012) (2012) IACSIT Press, Singapore Design of Expanded Assessment Management System for Open-Source

More information

THE QUEST FOR A CLOUD INTEGRATION STRATEGY

THE QUEST FOR A CLOUD INTEGRATION STRATEGY THE QUEST FOR A CLOUD INTEGRATION STRATEGY ENTERPRISE INTEGRATION Historically, enterprise-wide integration and its countless business benefits have only been available to large companies due to the high

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Unlocking the Commercial Potential in your Dynamics CRM Applications

Unlocking the Commercial Potential in your Dynamics CRM Applications Unlocking the Commercial Potential in your Dynamics CRM Applications Licensing, packaging & protecting your software A Software Potential Solution Overview InishTech 2012. All Rights Reserved. Reproduction

More information

CLOUD-BASED MULTI-TENANCY MODEL FOR SELF-SERVICE PORTAL

CLOUD-BASED MULTI-TENANCY MODEL FOR SELF-SERVICE PORTAL CLOUD-BASED MULTI-TENANCY MODEL FOR SELF-SERVICE PORTAL ABSTRACT Jitendra Maan 1 and Niranjan Mantha 2 Tata Consultancy Services Limited, India jitendra.maan@tcs.com niranjan.mantha@tcs.com A multi-tenant

More information

Multi Tenancy and Customizations Issues in e-health SaaS Applications

Multi Tenancy and Customizations Issues in e-health SaaS Applications Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,

More information

Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing

Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing Hilda Lawrance* Post Graduate Scholar Department of Information Technology, Karunya University Coimbatore, Tamilnadu, India

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Predicting the Impact of the Factors That Influence the Adoption of Multi-Tenant Databases

Predicting the Impact of the Factors That Influence the Adoption of Multi-Tenant Databases Proceedings of the International Conference on Computer and Information Science and Technology Ottawa, Ontario, Canada, May 11 12, 2015 Paper No. 105 Predicting the Impact of the Factors That Influence

More information

Requirement Engineering in Service-Oriented Architecture

Requirement Engineering in Service-Oriented Architecture 2012 International Conference on Networks and Information (ICNI 2012) IPCSIT vol. 57 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V57.19 Requirement Engineering in Service-Oriented Architecture

More information

RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD

RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD C.S. RAJARAJESWARI, M. ARAMUDHAN Research Scholar, Bharathiyar University,Coimbatore, Tamil Nadu, India. Assoc. Professor, Department of IT, PKIET, Karaikal,

More information

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

More information

An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications

An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications An Aspect-Oriented Product Line Framework to Support the Development of Software Product Lines of Web Applications Germán Harvey Alférez Salinas Department of Computer Information Systems, Mission College,

More information

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Overview:

More information

BUSINESS RULES CONCEPTS... 2 BUSINESS RULE ENGINE ARCHITECTURE... 4. By using the RETE Algorithm... 5. Benefits of RETE Algorithm...

BUSINESS RULES CONCEPTS... 2 BUSINESS RULE ENGINE ARCHITECTURE... 4. By using the RETE Algorithm... 5. Benefits of RETE Algorithm... 1 Table of Contents BUSINESS RULES CONCEPTS... 2 BUSINESS RULES... 2 RULE INFERENCE CONCEPT... 2 BASIC BUSINESS RULES CONCEPT... 3 BUSINESS RULE ENGINE ARCHITECTURE... 4 BUSINESS RULE ENGINE ARCHITECTURE...

More information

6 Cloud computing overview

6 Cloud computing overview 6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various

More information

Research on The Informatization Management of Enterprises under The

Research on The Informatization Management of Enterprises under The Research on The Informatization Management of Enterprises under The SaaS Model Anyang Institute of Technology, Anyang, Henan, 455000, China E-mail:liyan5175@163.com Abstract The rapid development of global

More information

A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING

A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Manjrasoft Market Oriented Cloud Computing Platform

Manjrasoft Market Oriented Cloud Computing Platform Manjrasoft Market Oriented Cloud Computing Platform Innovative Solutions for 3D Rendering Aneka is a market oriented Cloud development and management platform with rapid application development and workload

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

A framework to support flexible application collaboration in cloud computing

A framework to support flexible application collaboration in cloud computing Abstract A framework to support flexible application collaboration in cloud computing Meng Xu, Qingzhong Li *, Lizhen Cui School of Computer Science and Technology, Shandong University, China Shandong

More information

International Journal of Mechatronics, Electrical and Computer Technology

International Journal of Mechatronics, Electrical and Computer Technology A Method for Increasing Modifiability in Enterprise Architecture Implementation Using Cloud Computing Narges Rahmani 1*, Sayed Mehran Sharafi 2 and Bahman Zamani 3 1 Graduate Student, Department of Computer

More information

Data Cleansing for Remote Battery System Monitoring

Data Cleansing for Remote Battery System Monitoring Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network

More information